A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve...
Gespeichert in:
Veröffentlicht in: | Journal of computer security 2021-01, Vol.29 (4), p.423-446 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 446 |
---|---|
container_issue | 4 |
container_start_page | 423 |
container_title | Journal of computer security |
container_volume | 29 |
creator | Alam, Md Morshed Wang, Weichao |
description | Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis. |
doi_str_mv | 10.3233/JCS-200108 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2542457410</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2542457410</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</originalsourceid><addsrcrecordid>eNotkEtLAzEUhYMoWB8bf0HAnRBNMkkncVeKj0rBRSu4G66ZO3RKm4xJpjD_3il1deCcw72Hj5A7wR8LWRRPH_MVk5wLbs7IRJhSM2OlOicTbuWUSVl-X5KrlLacSyGsmZBhRl3YdxE36FN7QJr6eMCBBk9ryEC7GA7owTt8pqsMGVloWN4gg5gpdGMMboOJgq_paLeR1tjtwrBHnxNtQqSLsKYJXR_bPFD0o-XwmN6QiwZ2CW__9Zp8vb6s5-9s-fm2mM-WzEltM7OABiRKA2XdqLIALa11RrspQm21UAhTC-qHK6drI51z2jRYGuFUoUpZF9fk_nR33PrbY8rVNvTRjy8rqZVUulSCj62HU8vFkFLEpupiu4c4VIJXR7TViLY6oS3-AHXJbcY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2542457410</pqid></control><display><type>article</type><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><source>Business Source Complete</source><creator>Alam, Md Morshed ; Wang, Weichao</creator><creatorcontrib>Alam, Md Morshed ; Wang, Weichao</creatorcontrib><description>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</description><identifier>ISSN: 0926-227X</identifier><identifier>EISSN: 1875-8924</identifier><identifier>DOI: 10.3233/JCS-200108</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Comparative studies ; Data analysis ; Data management ; Information management ; State-of-the-art reviews</subject><ispartof>Journal of computer security, 2021-01, Vol.29 (4), p.423-446</ispartof><rights>Copyright IOS Press BV 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</citedby><cites>FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Alam, Md Morshed</creatorcontrib><creatorcontrib>Wang, Weichao</creatorcontrib><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><title>Journal of computer security</title><description>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</description><subject>Comparative studies</subject><subject>Data analysis</subject><subject>Data management</subject><subject>Information management</subject><subject>State-of-the-art reviews</subject><issn>0926-227X</issn><issn>1875-8924</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNotkEtLAzEUhYMoWB8bf0HAnRBNMkkncVeKj0rBRSu4G66ZO3RKm4xJpjD_3il1deCcw72Hj5A7wR8LWRRPH_MVk5wLbs7IRJhSM2OlOicTbuWUSVl-X5KrlLacSyGsmZBhRl3YdxE36FN7QJr6eMCBBk9ryEC7GA7owTt8pqsMGVloWN4gg5gpdGMMboOJgq_paLeR1tjtwrBHnxNtQqSLsKYJXR_bPFD0o-XwmN6QiwZ2CW__9Zp8vb6s5-9s-fm2mM-WzEltM7OABiRKA2XdqLIALa11RrspQm21UAhTC-qHK6drI51z2jRYGuFUoUpZF9fk_nR33PrbY8rVNvTRjy8rqZVUulSCj62HU8vFkFLEpupiu4c4VIJXR7TViLY6oS3-AHXJbcY</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Alam, Md Morshed</creator><creator>Wang, Weichao</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20210101</creationdate><title>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</title><author>Alam, Md Morshed ; Wang, Weichao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-9ae8a2e28a7df473a5299c85c6ead9514ea69a4b04c5d82ccc58fe781c43472d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Comparative studies</topic><topic>Data analysis</topic><topic>Data management</topic><topic>Information management</topic><topic>State-of-the-art reviews</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alam, Md Morshed</creatorcontrib><creatorcontrib>Wang, Weichao</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alam, Md Morshed</au><au>Wang, Weichao</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement</atitle><jtitle>Journal of computer security</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>29</volume><issue>4</issue><spage>423</spage><epage>446</epage><pages>423-446</pages><issn>0926-227X</issn><eissn>1875-8924</eissn><abstract>Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JCS-200108</doi><tpages>24</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0926-227X |
ispartof | Journal of computer security, 2021-01, Vol.29 (4), p.423-446 |
issn | 0926-227X 1875-8924 |
language | eng |
recordid | cdi_proquest_journals_2542457410 |
source | Business Source Complete |
subjects | Comparative studies Data analysis Data management Information management State-of-the-art reviews |
title | A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A32%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20comprehensive%20survey%20on%20data%20provenance:%20State-of-the-art%20approaches%20and%20their%20deployments%20for%20IoT%20security%20enforcement&rft.jtitle=Journal%20of%20computer%20security&rft.au=Alam,%20Md%20Morshed&rft.date=2021-01-01&rft.volume=29&rft.issue=4&rft.spage=423&rft.epage=446&rft.pages=423-446&rft.issn=0926-227X&rft.eissn=1875-8924&rft_id=info:doi/10.3233/JCS-200108&rft_dat=%3Cproquest_cross%3E2542457410%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2542457410&rft_id=info:pmid/&rfr_iscdi=true |